Critical MediaTek Flaws Allow Hackers to Gain Elevated Access with No User Input

Critical MediaTek Flaws Allow Hackers to Gain Elevated Access with No User Input

MediaTek has published its latest Product Security Bulletin, revealing several security vulnerabilities affecting a wide range of its chipsets used in smartphones, tablets, AIoT devices, smart displays, smart platforms, OTT devices, computer vision systems, audio equipment, and TVs.

Device OEMs were notified of these issues and provided with corresponding security patches at least two months before the public disclosure, in line with industry best practices.

Severity Assessment and Technical Overview

The assessment of these vulnerabilities was conducted using the Common Vulnerability Scoring System version 3.1 (CVSS v3.1), which is widely adopted for evaluating the severity of software vulnerabilities.

– Advertisement –

The bulletin identifies one high-severity vulnerability (CVE-2025-20672) and six medium-severity vulnerabilities (CVE-2025-20673 through CVE-2025-20678).

The vulnerabilities span multiple technical categories, including:

  • Elevation of Privilege (EoP): Allows attackers to gain unauthorized access or privileges.
  • Denial of Service (DoS): Enables attackers to disrupt normal functioning, leading to system crashes.
  • CWE-122 Heap Overflow: A critical issue where improper bounds checking allows writing outside the allocated memory, potentially leading to privilege escalation.
  • CWE-476 NULL Pointer Dereference: Occurs when a program attempts to use a null pointer, leading to crashes or denial of service.
  • CWE-863 Incorrect Authorization: Involves missing permission checks, potentially allowing unauthorized actions.
  • CWE-674 Uncontrolled Recursion: Excessive recursive calls can cause stack overflows and service disruptions.

Detailed Vulnerability Breakdown

The following table summarizes the reported vulnerabilities, their technical nature, and affected chipsets:

CVE Title Severity Vulnerability Type CWE Code Affected Chipsets Affected Software Versions
CVE-2025-20672 Heap overflow in Bluetooth High EoP CWE-122 MT7902, MT7921, MT7922, MT7925, MT7927 NB SDK release 3.6 and before
CVE-2025-20673 Null pointer dereference in wlan Medium DoS CWE-476 MT7902, MT7921, MT7922, MT7925, MT7927 NB SDK release 3.6 and before
CVE-2025-20674 Incorrect authorization in wlan Medium EoP CWE-863 MT6890, MT6990, MT7915, MT7916, MT7981, MT7986, MT7990, MT7992, MT7993 SDK release 7.6.7.2 and before / OpenWrt 19.07, 21.02 (MT6890) / OpenWrt 21.02, 23.05 (MT6990)
CVE-2025-20675 Null pointer dereference in wlan Medium DoS CWE-476 MT7902, MT7921, MT7922, MT7925, MT7927 NB SDK release 3.6 and before
CVE-2025-20676 Null pointer dereference in wlan Medium DoS CWE-476 MT7902, MT7921, MT7922, MT7925, MT7927 NB SDK release 3.6 and before
CVE-2025-20677 Null pointer dereference in Bluetooth Medium DoS CWE-476 MT7902, MT7921, MT7922, MT7925, MT7927 NB SDK release 3.6 and before
CVE-2025-20678 Uncontrolled recursion in ims service Medium DoS CWE-674 Extensive list (e.g., MT6739, MT6761, MT6890, MT6990, etc.) Modem LR12A, LR13, NR15, NR16, NR17, NR17R

Response and Industry Impact

MediaTek has proactively engaged with device manufacturers, ensuring that patches are available ahead of public disclosure.

The company emphasizes that the list of affected chipsets may not be exhaustive and encourages OEMs to contact their MediaTek representative for further clarification.

For users and enterprises, the timely application of security updates remains critical. MediaTek also invites researchers and stakeholders to report any additional vulnerabilities through its official channels.

Key Technical Terms:

  • CVE (Common Vulnerabilities and Exposures): Unique identifiers for publicly known cybersecurity vulnerabilities.
  • CWE (Common Weakness Enumeration): Standardized categories for software weaknesses.
  • EoP, DoS, RCE: Abbreviations for Elevation of Privilege, Denial of Service, and Remote Code Execution, respectively.

MediaTek’s bulletin underscores the ongoing need for vigilance in the rapidly evolving landscape of embedded and connected device security.

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!


Source link